diff mbox series

xfs: fix ag count overflow during growfs

Message ID 20230425025345.GA2098270@ceph-admin (mailing list archive)
State Superseded
Headers show
Series xfs: fix ag count overflow during growfs | expand

Commit Message

Long Li April 25, 2023, 2:53 a.m. UTC
I found a corruption during growfs:

 XFS (loop0): Internal error agbno >= mp->m_sb.sb_agblocks at line 3661 of
   file fs/xfs/libxfs/xfs_alloc.c.  Caller __xfs_free_extent+0x28e/0x3c0
 CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
 Call Trace:
  <TASK>
  dump_stack_lvl+0x50/0x70
  xfs_corruption_error+0x134/0x150
  __xfs_free_extent+0x2c1/0x3c0
  xfs_ag_extend_space+0x291/0x3e0
  xfs_growfs_data+0xd72/0xe90
  xfs_file_ioctl+0x5f9/0x14a0
  __x64_sys_ioctl+0x13e/0x1c0
  do_syscall_64+0x39/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 XFS (loop0): Corruption detected. Unmount and run xfs_repair
 XFS (loop0): Internal error xfs_trans_cancel at line 1097 of file
   fs/xfs/xfs_trans.c.  Caller xfs_growfs_data+0x691/0xe90
 CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
 Call Trace:
  <TASK>
  dump_stack_lvl+0x50/0x70
  xfs_error_report+0x93/0xc0
  xfs_trans_cancel+0x2c0/0x350
  xfs_growfs_data+0x691/0xe90
  xfs_file_ioctl+0x5f9/0x14a0
  __x64_sys_ioctl+0x13e/0x1c0
  do_syscall_64+0x39/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0033:0x7f2d86706577

The bug can be reproduced with the following sequence:

 # truncate -s  1073741824 xfs_test.img
 # mkfs.xfs -f -b size=1024 -d agcount=4 xfs_test.img
 # truncate -s 2305843009213693952  xfs_test.img
 # mount -o loop xfs_test.img /mnt/test
 # xfs_growfs -D  1125899907891200  /mnt/test

The root cause is that during growfs, user space passed in a large value
of newblcoks to xfs_growfs_data_private(), due to current sb_agblocks is
too small, new AG count will exceed UINT_MAX. Because of AG number type
is unsigned int and it would overflow, that caused nagcount much smaller
than the actual value. During AG extent space, delta blocks in
xfs_resizefs_init_new_ags() will much larger than the actual value due to
incorrect nagcount, even exceed UINT_MAX. This will cause corruption and
be detected in __xfs_free_extent. Fix it by add checks for AG number that
should not greater than or equal to NULLAGNUMBER before growfs and mount
filesystem.

Signed-off-by: Long Li <leo.lilong@huawei.com>
---
 fs/xfs/xfs_fsops.c   | 2 +-
 fs/xfs/xfs_mount.c   | 6 +++++-
 fs/xfs/xfs_mount.h   | 2 +-
 fs/xfs/xfs_rtalloc.c | 2 +-
 fs/xfs/xfs_super.c   | 4 ++--
 5 files changed, 10 insertions(+), 6 deletions(-)

Comments

Darrick J. Wong April 25, 2023, 3:15 p.m. UTC | #1
On Tue, Apr 25, 2023 at 10:53:45AM +0800, Long Li wrote:
> I found a corruption during growfs:
> 
>  XFS (loop0): Internal error agbno >= mp->m_sb.sb_agblocks at line 3661 of
>    file fs/xfs/libxfs/xfs_alloc.c.  Caller __xfs_free_extent+0x28e/0x3c0
>  CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
>  Call Trace:
>   <TASK>
>   dump_stack_lvl+0x50/0x70
>   xfs_corruption_error+0x134/0x150
>   __xfs_free_extent+0x2c1/0x3c0
>   xfs_ag_extend_space+0x291/0x3e0
>   xfs_growfs_data+0xd72/0xe90
>   xfs_file_ioctl+0x5f9/0x14a0
>   __x64_sys_ioctl+0x13e/0x1c0
>   do_syscall_64+0x39/0x80
>   entry_SYSCALL_64_after_hwframe+0x63/0xcd
>  XFS (loop0): Corruption detected. Unmount and run xfs_repair
>  XFS (loop0): Internal error xfs_trans_cancel at line 1097 of file
>    fs/xfs/xfs_trans.c.  Caller xfs_growfs_data+0x691/0xe90
>  CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
>  Call Trace:
>   <TASK>
>   dump_stack_lvl+0x50/0x70
>   xfs_error_report+0x93/0xc0
>   xfs_trans_cancel+0x2c0/0x350
>   xfs_growfs_data+0x691/0xe90
>   xfs_file_ioctl+0x5f9/0x14a0
>   __x64_sys_ioctl+0x13e/0x1c0
>   do_syscall_64+0x39/0x80
>   entry_SYSCALL_64_after_hwframe+0x63/0xcd
>  RIP: 0033:0x7f2d86706577
> 
> The bug can be reproduced with the following sequence:
> 
>  # truncate -s  1073741824 xfs_test.img
>  # mkfs.xfs -f -b size=1024 -d agcount=4 xfs_test.img
>  # truncate -s 2305843009213693952  xfs_test.img
>  # mount -o loop xfs_test.img /mnt/test
>  # xfs_growfs -D  1125899907891200  /mnt/test
> 
> The root cause is that during growfs, user space passed in a large value
> of newblcoks to xfs_growfs_data_private(), due to current sb_agblocks is
> too small, new AG count will exceed UINT_MAX. Because of AG number type
> is unsigned int and it would overflow, that caused nagcount much smaller
> than the actual value. During AG extent space, delta blocks in
> xfs_resizefs_init_new_ags() will much larger than the actual value due to
> incorrect nagcount, even exceed UINT_MAX. This will cause corruption and
> be detected in __xfs_free_extent. Fix it by add checks for AG number that
> should not greater than or equal to NULLAGNUMBER before growfs and mount
> filesystem.
> 
> Signed-off-by: Long Li <leo.lilong@huawei.com>
> ---
>  fs/xfs/xfs_fsops.c   | 2 +-
>  fs/xfs/xfs_mount.c   | 6 +++++-
>  fs/xfs/xfs_mount.h   | 2 +-
>  fs/xfs/xfs_rtalloc.c | 2 +-
>  fs/xfs/xfs_super.c   | 4 ++--
>  5 files changed, 10 insertions(+), 6 deletions(-)
> 
> diff --git a/fs/xfs/xfs_fsops.c b/fs/xfs/xfs_fsops.c
> index 13851c0d640b..0f0b12eaf53a 100644
> --- a/fs/xfs/xfs_fsops.c
> +++ b/fs/xfs/xfs_fsops.c
> @@ -100,7 +100,7 @@ xfs_growfs_data_private(
>  	struct xfs_perag	*last_pag;
>  
>  	nb = in->newblocks;
> -	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb);
> +	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb, true);
>  	if (error)
>  		return error;
>  
> diff --git a/fs/xfs/xfs_mount.c b/fs/xfs/xfs_mount.c
> index fb87ffb48f7f..284c11c1c6e8 100644
> --- a/fs/xfs/xfs_mount.c
> +++ b/fs/xfs/xfs_mount.c
> @@ -128,7 +128,8 @@ xfs_uuid_unmount(
>  int
>  xfs_sb_validate_fsb_count(
>  	xfs_sb_t	*sbp,
> -	uint64_t	nblocks)
> +	uint64_t	nblocks,
> +	bool		dblock)
>  {
>  	ASSERT(PAGE_SHIFT >= sbp->sb_blocklog);
>  	ASSERT(sbp->sb_blocklog >= BBSHIFT);
> @@ -136,6 +137,9 @@ xfs_sb_validate_fsb_count(
>  	/* Limited by ULONG_MAX of page cache index */
>  	if (nblocks >> (PAGE_SHIFT - sbp->sb_blocklog) > ULONG_MAX)
>  		return -EFBIG;
> +	/* Limited by NULLAGNUMBER of ag number */
> +	if (dblock && (nblocks >> sbp->sb_agblklog) >= NULLAGNUMBER)
> +		return -EFBIG;

I think this should be a separate predicate to check for overflowing
agcount in xfs_validate_sb_common and xfs_growfs_data_private.

I also wonder if @agcount in xfs_validate_sb_common needs to be u64 (and
not u32) to handle overflows?

Someone should try fuzzing a filesystem with a small agblklog and a
large dblocks to see if one can trip an integer overflow in the
superblock verifier.

--D

>  	return 0;
>  }
>  
> diff --git a/fs/xfs/xfs_mount.h b/fs/xfs/xfs_mount.h
> index f3269c0626f0..a69e9b21ef61 100644
> --- a/fs/xfs/xfs_mount.h
> +++ b/fs/xfs/xfs_mount.h
> @@ -531,7 +531,7 @@ xfs_mod_frextents(struct xfs_mount *mp, int64_t delta)
>  extern int	xfs_readsb(xfs_mount_t *, int);
>  extern void	xfs_freesb(xfs_mount_t *);
>  extern bool	xfs_fs_writable(struct xfs_mount *mp, int level);
> -extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t);
> +extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t, bool);
>  
>  extern int	xfs_dev_is_read_only(struct xfs_mount *, char *);
>  
> diff --git a/fs/xfs/xfs_rtalloc.c b/fs/xfs/xfs_rtalloc.c
> index 16534e9873f6..c207026d92ac 100644
> --- a/fs/xfs/xfs_rtalloc.c
> +++ b/fs/xfs/xfs_rtalloc.c
> @@ -958,7 +958,7 @@ xfs_growfs_rt(
>  		return -EOPNOTSUPP;
>  
>  	nrblocks = in->newblocks;
> -	error = xfs_sb_validate_fsb_count(sbp, nrblocks);
> +	error = xfs_sb_validate_fsb_count(sbp, nrblocks, false);
>  	if (error)
>  		return error;
>  	/*
> diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c
> index 4d2e87462ac4..72dfd02c588e 100644
> --- a/fs/xfs/xfs_super.c
> +++ b/fs/xfs/xfs_super.c
> @@ -1592,8 +1592,8 @@ xfs_fs_fill_super(
>  	}
>  
>  	/* Ensure this filesystem fits in the page cache limits */
> -	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks) ||
> -	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks)) {
> +	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks, true) ||
> +	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks, false)) {
>  		xfs_warn(mp,
>  		"file system too large to be mounted on this system.");
>  		error = -EFBIG;
> -- 
> 2.31.1
>
Long Li April 27, 2023, 9:05 a.m. UTC | #2
On Tue, Apr 25, 2023 at 08:15:29AM -0700, Darrick J. Wong wrote:
> On Tue, Apr 25, 2023 at 10:53:45AM +0800, Long Li wrote:
> > I found a corruption during growfs:
> > 
> >  XFS (loop0): Internal error agbno >= mp->m_sb.sb_agblocks at line 3661 of
> >    file fs/xfs/libxfs/xfs_alloc.c.  Caller __xfs_free_extent+0x28e/0x3c0
> >  CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
> >  Call Trace:
> >   <TASK>
> >   dump_stack_lvl+0x50/0x70
> >   xfs_corruption_error+0x134/0x150
> >   __xfs_free_extent+0x2c1/0x3c0
> >   xfs_ag_extend_space+0x291/0x3e0
> >   xfs_growfs_data+0xd72/0xe90
> >   xfs_file_ioctl+0x5f9/0x14a0
> >   __x64_sys_ioctl+0x13e/0x1c0
> >   do_syscall_64+0x39/0x80
> >   entry_SYSCALL_64_after_hwframe+0x63/0xcd
> >  XFS (loop0): Corruption detected. Unmount and run xfs_repair
> >  XFS (loop0): Internal error xfs_trans_cancel at line 1097 of file
> >    fs/xfs/xfs_trans.c.  Caller xfs_growfs_data+0x691/0xe90
> >  CPU: 0 PID: 573 Comm: xfs_growfs Not tainted 6.3.0-rc7-next-20230420-00001-gda8c95746257
> >  Call Trace:
> >   <TASK>
> >   dump_stack_lvl+0x50/0x70
> >   xfs_error_report+0x93/0xc0
> >   xfs_trans_cancel+0x2c0/0x350
> >   xfs_growfs_data+0x691/0xe90
> >   xfs_file_ioctl+0x5f9/0x14a0
> >   __x64_sys_ioctl+0x13e/0x1c0
> >   do_syscall_64+0x39/0x80
> >   entry_SYSCALL_64_after_hwframe+0x63/0xcd
> >  RIP: 0033:0x7f2d86706577
> > 
> > The bug can be reproduced with the following sequence:
> > 
> >  # truncate -s  1073741824 xfs_test.img
> >  # mkfs.xfs -f -b size=1024 -d agcount=4 xfs_test.img
> >  # truncate -s 2305843009213693952  xfs_test.img
> >  # mount -o loop xfs_test.img /mnt/test
> >  # xfs_growfs -D  1125899907891200  /mnt/test
> > 
> > The root cause is that during growfs, user space passed in a large value
> > of newblcoks to xfs_growfs_data_private(), due to current sb_agblocks is
> > too small, new AG count will exceed UINT_MAX. Because of AG number type
> > is unsigned int and it would overflow, that caused nagcount much smaller
> > than the actual value. During AG extent space, delta blocks in
> > xfs_resizefs_init_new_ags() will much larger than the actual value due to
> > incorrect nagcount, even exceed UINT_MAX. This will cause corruption and
> > be detected in __xfs_free_extent. Fix it by add checks for AG number that
> > should not greater than or equal to NULLAGNUMBER before growfs and mount
> > filesystem.
> > 
> > Signed-off-by: Long Li <leo.lilong@huawei.com>
> > ---
> >  fs/xfs/xfs_fsops.c   | 2 +-
> >  fs/xfs/xfs_mount.c   | 6 +++++-
> >  fs/xfs/xfs_mount.h   | 2 +-
> >  fs/xfs/xfs_rtalloc.c | 2 +-
> >  fs/xfs/xfs_super.c   | 4 ++--
> >  5 files changed, 10 insertions(+), 6 deletions(-)
> > 
> > diff --git a/fs/xfs/xfs_fsops.c b/fs/xfs/xfs_fsops.c
> > index 13851c0d640b..0f0b12eaf53a 100644
> > --- a/fs/xfs/xfs_fsops.c
> > +++ b/fs/xfs/xfs_fsops.c
> > @@ -100,7 +100,7 @@ xfs_growfs_data_private(
> >  	struct xfs_perag	*last_pag;
> >  
> >  	nb = in->newblocks;
> > -	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb);
> > +	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb, true);
> >  	if (error)
> >  		return error;
> >  
> > diff --git a/fs/xfs/xfs_mount.c b/fs/xfs/xfs_mount.c
> > index fb87ffb48f7f..284c11c1c6e8 100644
> > --- a/fs/xfs/xfs_mount.c
> > +++ b/fs/xfs/xfs_mount.c
> > @@ -128,7 +128,8 @@ xfs_uuid_unmount(
> >  int
> >  xfs_sb_validate_fsb_count(
> >  	xfs_sb_t	*sbp,
> > -	uint64_t	nblocks)
> > +	uint64_t	nblocks,
> > +	bool		dblock)
> >  {
> >  	ASSERT(PAGE_SHIFT >= sbp->sb_blocklog);
> >  	ASSERT(sbp->sb_blocklog >= BBSHIFT);
> > @@ -136,6 +137,9 @@ xfs_sb_validate_fsb_count(
> >  	/* Limited by ULONG_MAX of page cache index */
> >  	if (nblocks >> (PAGE_SHIFT - sbp->sb_blocklog) > ULONG_MAX)
> >  		return -EFBIG;
> > +	/* Limited by NULLAGNUMBER of ag number */
> > +	if (dblock && (nblocks >> sbp->sb_agblklog) >= NULLAGNUMBER)
> > +		return -EFBIG;
> 
> I think this should be a separate predicate to check for overflowing
> agcount in xfs_validate_sb_common and xfs_growfs_data_private.
> 
Ok, the next version will be changed.

> I also wonder if @agcount in xfs_validate_sb_common needs to be u64 (and
> not u32) to handle overflows?

It looks like there is no need for @agcount overflow checking in xfs_validate_sb_common:
If agcount overflow occurs, the flollowing judgment will be true and SB sanity check failed.

	sbp->sb_dblocks > XFS_MAX_DBLOCKS(sbp)

So the check for overflowing of agcount should only need in xfs_growfs_data_private(). 

Thanks,
Long Li

> Someone should try fuzzing a filesystem with a small agblklog and a
> large dblocks to see if one can trip an integer overflow in the
> superblock verifier.
> 
> --D
> 
> >  	return 0;
> >  }
> >  
> > diff --git a/fs/xfs/xfs_mount.h b/fs/xfs/xfs_mount.h
> > index f3269c0626f0..a69e9b21ef61 100644
> > --- a/fs/xfs/xfs_mount.h
> > +++ b/fs/xfs/xfs_mount.h
> > @@ -531,7 +531,7 @@ xfs_mod_frextents(struct xfs_mount *mp, int64_t delta)
> >  extern int	xfs_readsb(xfs_mount_t *, int);
> >  extern void	xfs_freesb(xfs_mount_t *);
> >  extern bool	xfs_fs_writable(struct xfs_mount *mp, int level);
> > -extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t);
> > +extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t, bool);
> >  
> >  extern int	xfs_dev_is_read_only(struct xfs_mount *, char *);
> >  
> > diff --git a/fs/xfs/xfs_rtalloc.c b/fs/xfs/xfs_rtalloc.c
> > index 16534e9873f6..c207026d92ac 100644
> > --- a/fs/xfs/xfs_rtalloc.c
> > +++ b/fs/xfs/xfs_rtalloc.c
> > @@ -958,7 +958,7 @@ xfs_growfs_rt(
> >  		return -EOPNOTSUPP;
> >  
> >  	nrblocks = in->newblocks;
> > -	error = xfs_sb_validate_fsb_count(sbp, nrblocks);
> > +	error = xfs_sb_validate_fsb_count(sbp, nrblocks, false);
> >  	if (error)
> >  		return error;
> >  	/*
> > diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c
> > index 4d2e87462ac4..72dfd02c588e 100644
> > --- a/fs/xfs/xfs_super.c
> > +++ b/fs/xfs/xfs_super.c
> > @@ -1592,8 +1592,8 @@ xfs_fs_fill_super(
> >  	}
> >  
> >  	/* Ensure this filesystem fits in the page cache limits */
> > -	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks) ||
> > -	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks)) {
> > +	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks, true) ||
> > +	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks, false)) {
> >  		xfs_warn(mp,
> >  		"file system too large to be mounted on this system.");
> >  		error = -EFBIG;
> > -- 
> > 2.31.1
> >
diff mbox series

Patch

diff --git a/fs/xfs/xfs_fsops.c b/fs/xfs/xfs_fsops.c
index 13851c0d640b..0f0b12eaf53a 100644
--- a/fs/xfs/xfs_fsops.c
+++ b/fs/xfs/xfs_fsops.c
@@ -100,7 +100,7 @@  xfs_growfs_data_private(
 	struct xfs_perag	*last_pag;
 
 	nb = in->newblocks;
-	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb);
+	error = xfs_sb_validate_fsb_count(&mp->m_sb, nb, true);
 	if (error)
 		return error;
 
diff --git a/fs/xfs/xfs_mount.c b/fs/xfs/xfs_mount.c
index fb87ffb48f7f..284c11c1c6e8 100644
--- a/fs/xfs/xfs_mount.c
+++ b/fs/xfs/xfs_mount.c
@@ -128,7 +128,8 @@  xfs_uuid_unmount(
 int
 xfs_sb_validate_fsb_count(
 	xfs_sb_t	*sbp,
-	uint64_t	nblocks)
+	uint64_t	nblocks,
+	bool		dblock)
 {
 	ASSERT(PAGE_SHIFT >= sbp->sb_blocklog);
 	ASSERT(sbp->sb_blocklog >= BBSHIFT);
@@ -136,6 +137,9 @@  xfs_sb_validate_fsb_count(
 	/* Limited by ULONG_MAX of page cache index */
 	if (nblocks >> (PAGE_SHIFT - sbp->sb_blocklog) > ULONG_MAX)
 		return -EFBIG;
+	/* Limited by NULLAGNUMBER of ag number */
+	if (dblock && (nblocks >> sbp->sb_agblklog) >= NULLAGNUMBER)
+		return -EFBIG;
 	return 0;
 }
 
diff --git a/fs/xfs/xfs_mount.h b/fs/xfs/xfs_mount.h
index f3269c0626f0..a69e9b21ef61 100644
--- a/fs/xfs/xfs_mount.h
+++ b/fs/xfs/xfs_mount.h
@@ -531,7 +531,7 @@  xfs_mod_frextents(struct xfs_mount *mp, int64_t delta)
 extern int	xfs_readsb(xfs_mount_t *, int);
 extern void	xfs_freesb(xfs_mount_t *);
 extern bool	xfs_fs_writable(struct xfs_mount *mp, int level);
-extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t);
+extern int	xfs_sb_validate_fsb_count(struct xfs_sb *, uint64_t, bool);
 
 extern int	xfs_dev_is_read_only(struct xfs_mount *, char *);
 
diff --git a/fs/xfs/xfs_rtalloc.c b/fs/xfs/xfs_rtalloc.c
index 16534e9873f6..c207026d92ac 100644
--- a/fs/xfs/xfs_rtalloc.c
+++ b/fs/xfs/xfs_rtalloc.c
@@ -958,7 +958,7 @@  xfs_growfs_rt(
 		return -EOPNOTSUPP;
 
 	nrblocks = in->newblocks;
-	error = xfs_sb_validate_fsb_count(sbp, nrblocks);
+	error = xfs_sb_validate_fsb_count(sbp, nrblocks, false);
 	if (error)
 		return error;
 	/*
diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c
index 4d2e87462ac4..72dfd02c588e 100644
--- a/fs/xfs/xfs_super.c
+++ b/fs/xfs/xfs_super.c
@@ -1592,8 +1592,8 @@  xfs_fs_fill_super(
 	}
 
 	/* Ensure this filesystem fits in the page cache limits */
-	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks) ||
-	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks)) {
+	if (xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_dblocks, true) ||
+	    xfs_sb_validate_fsb_count(&mp->m_sb, mp->m_sb.sb_rblocks, false)) {
 		xfs_warn(mp,
 		"file system too large to be mounted on this system.");
 		error = -EFBIG;